2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.110
|View full text |Cite
|
Sign up to set email alerts
|

An Architectural Foundation for Security Model Sharing and Reuse

Abstract: Within the field of software security we have yet to find efficient ways on how to learn from past mistakes and integrate security as a natural part of software development. This situation can be improved by using an online repository, the SHIELDS SVRS, that facilitates fast and easy interchange of security artefacts between security experts, software developers and their assisting tools. Such security artefacts are embedded in or represented as security models containing the needed information to detect, remo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…Concerning the first point, an approach using a security repository concept such as those presented by Meland et al [11] and Ardi et al [25] allows security experts together with legal professionals to share the results of the complex requirements elicitation process. To include a feedback system in such repositories will allow both developers and other security experts to review the requirements, and constantly improve the repository content.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Concerning the first point, an approach using a security repository concept such as those presented by Meland et al [11] and Ardi et al [25] allows security experts together with legal professionals to share the results of the complex requirements elicitation process. To include a feedback system in such repositories will allow both developers and other security experts to review the requirements, and constantly improve the repository content.…”
Section: Discussionmentioning
confidence: 99%
“…Security repositories containing requirements have been suggested by among others Sindre et al [8] and Toval et al [10]. Meland et al [11] have, in the SHIELDS project 2 , defined an architecture for a repository that together with other software security artefacts can contain a security requirements catalogue.…”
Section: Reuse Of Security Requirementsmentioning
confidence: 99%
“…This study in [14] investigates the privacy aspects of attribute sharing in Single Sign-On (SSO) solutions. The researchers examine the process of attribute sharing among multiple service providers in SSO systems and analyze the privacy risks associated with this sharing.…”
Section: Fett Et Al [8]mentioning
confidence: 99%
“…The SHIELDS EU project [63] has developed the SHIELDS internet-based Security Vulnerabilities Repository Service (SVRS) which is a VAD to support S3P and other applications [55], [56]. The GOAT tool is compatible with the SVRS and interfaces with it.…”
Section: Research Contributionmentioning
confidence: 99%